Skip to main content

Research on the Breakthrough of Defense System from the Perspective of Red Team

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1342))

Abstract

The safe operation of the network is the focus of the network operators, and testing the security of the network is an important indicator for evaluating the network. A comprehensive contains various devices, operating systems, software and hardware, and many different users. How to evaluate the security of the network is a problem considered by network security personnel. Drawing lessons from the ideas of the red army and the blue army’s confrontation exercises in military exercises, this article proposes to conduct actual offensive and defensive exercises on the network from the perspective of the red team, to study the attack methods used in different stages of the network offensive and defensive, and to provide some experience for improving the security of the network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. https://blog.csdn.net/qq_36119192/article/details/90411169

  2. Zhang, M.: Analysis of situational teaching method in network security course. Sci. Educ. Guide. 5(9), 148–149 (2019)

    Google Scholar 

  3. https://security.tencent.com/index.php/blog/msg/139

  4. Guofang, Z.: The web penetration based SQL injection. Lect. Notes Electr. Eng. 551, 12 (2019)

    Google Scholar 

  5. Zhang, Q.: Exploration on the integration of red blue confrontation and safety supervision. Electr. Des. Eng. 8(11), 127–128 (2015)

    Google Scholar 

  6. https://wenku.baidu.com/view/32f69c24192e45361066f5dd.html

  7. Guofang, Z., Weitao, L.: A security reinforcement scheme for the server. WOP Educ. Soc. Sci. Psychol. 14(7), 92 (2018)

    Google Scholar 

  8. Georgia, W.: Penetration Test. People’s post and telecommunications press, China, vol. 5, pp. 124–125 (2019)

    Google Scholar 

  9. Guofang, Z.: Research on mobile security communication based on digital fingerprint encryption. Adv. Eng. Appl. Sci. Res. 3, 403–407 (2019)

    Google Scholar 

  10. Red blue confrontation. https://he1m4n6a.github.io/

  11. Red blue confrontation. https://www.secpulse.com/archives/107194.html

  12. Common network attack technology. https://blog.csdn.net/qq_39507276/article/details/88883421

Download references

Acknowledgement

This paper is supported by “Research project of higher education and teaching reform of Hainan Provincial Department of Education: Hnjg2020-144”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guofang Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, G., Zhou, R. (2021). Research on the Breakthrough of Defense System from the Perspective of Red Team. In: Xu, Z., Parizi, R.M., Loyola-González, O., Zhang, X. (eds) Cyber Security Intelligence and Analytics. CSIA 2021. Advances in Intelligent Systems and Computing, vol 1342. Springer, Cham. https://doi.org/10.1007/978-3-030-70042-3_31

Download citation

Publish with us

Policies and ethics